期刊文献+
共找到3,807篇文章
< 1 2 191 >
每页显示 20 50 100
Verifiable quantum secret sharing scheme based on orthogonal product states
1
作者 白晨明 刘璐 张素娟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期178-187,共10页
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc... In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol. 展开更多
关键词 quantum secret sharing quantum product state threshold scheme unitary operations
下载PDF
Bound State Description of Particles from a Quantum Field Theory of Fermions and Bosons, Compatible with Relativity
2
作者 Hans-Peter Morsch 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第2期562-573,共12页
Both, the dilemma to find a quantum field theory consistent with Einstein’s law of relativity and the problem to describe existing particles as bound states of matter has been solved by calculating bound state matrix... Both, the dilemma to find a quantum field theory consistent with Einstein’s law of relativity and the problem to describe existing particles as bound states of matter has been solved by calculating bound state matrix elements from a dual fermion-boson Lagrangian. In this formalism, the fermion binding energies are compensated by boson energies, indicating that particles can be generated out of the vacuum. This yields quantitative solutions for various mesons ω (0.78 GeV) - Υ (9.46 GeV) and all leptons e, μ and τ, with uncertainties in the extracted properties of less than 1‰. For transparency, a Web-page with the address htpps://h2909473.stratoserver.net has been constructed, where all calculations can be run on line and also the underlying fortran source code can be inspected. 展开更多
关键词 quantum Field Theory of Fermion and Boson Fields Hadrons and Leptons Described as Bound states of Relativistic Fermions and Bosons Leading to a Total Energy Equal to Zero
下载PDF
Quantum properties of nonclassical states generated by an optomechanical system with catalytic quantum scissors
3
作者 李恒梅 杨保华 +1 位作者 袁洪春 许业军 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期311-318,共8页
A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of ... A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of the optomechanical system, the resulting state contains only the vacuum, single-photon and two-photon states depending upon the coupling parameter of the optomechanical system as well as the transmission coefficients of beam splitters(BSs). Especially, the output state is just a class of multicomponent cat state truncations at time t = 2π by choosing the appropriate value of coupling parameter. We discuss the success probability of such a state and the fidelity between the output state and input state via QSD. Then the linear entropy is used to investigate the entanglement between the two subsystems, finding that QSD operation can enhance their entanglement degree. Furthermore, we also derive the analytical expression of the Wigner function(WF) for the cavity mode via QSD and numerically analyze the WF distribution in phase space at time t =2π. These results show that the high non-classicality of output state can always be achieved by modulating the coupling parameter of the optomechanical system as well as the transmittance of BSs. 展开更多
关键词 optomechanical system quantum scissors device quantum state engineering linear entropy
下载PDF
Direct measurement of nonlocal quantum states without approximation
4
作者 杨冈 杨然 +1 位作者 龚彦晓 祝世宁 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第11期252-256,共5页
Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with recons... Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with reconstruction algorithm, weak values were proposed to directly measure density matrix elements of quantum state. Recently, similar to the concept of weak value, modular values were introduced to extend the direct measurement scheme to nonlocal quantum wavefunction. However, this method still involves approximations, which leads to inherent low precision. Here, we propose a new scheme which enables direct measurement for ideal value of the nonlocal density matrix element without taking approximations. Our scheme allows more accurate characterization of nonlocal quantum states, and therefore has greater advantages in practical measurement scenarios. 展开更多
关键词 direct measurement quantum tomography nonlocal quantum state
下载PDF
Improved statistical fluctuation analysis for two decoy-states phase-matching quantum key distribution
5
作者 周江平 周媛媛 +1 位作者 周学军 暴轩 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期188-194,共7页
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant... Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation. 展开更多
关键词 quantum key distribution phase matching protocol statistical fluctuation analysis decoy state
下载PDF
Effect of weak randomness flaws on security evaluation of practical quantum key distribution with distinguishable decoy states
6
作者 周雨 李宏伟 +5 位作者 周淳 汪洋 陆宜飞 江木生 张晓旭 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期254-260,共7页
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections... Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation. 展开更多
关键词 weak randomness quantum key distribution distinguishable decoy state
下载PDF
An efficient two-step quantum key distribution protocol with orthogonal product states 被引量:4
7
作者 杨宇光 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第4期910-914,共5页
关键词 两步量子密钥分配协议 正交积态 正交测量 希耳伯特空间
下载PDF
Quantum communication for satellite-to-ground networks with partially entangled states
8
作者 陈娜 权东晓 +1 位作者 裴昌幸 杨宏 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第2期53-61,共9页
To realize practical wide-area quantum communication,a satellite-to-ground network with partially entangled states is developed in this paper.For efficiency and security reasons,the existing method of quantum communic... To realize practical wide-area quantum communication,a satellite-to-ground network with partially entangled states is developed in this paper.For efficiency and security reasons,the existing method of quantum communication in distributed wireless quantum networks with partially entangled states cannot be applied directly to the proposed quantum network.Based on this point,an efficient and secure quantum communication scheme with partially entangled states is presented.In our scheme,the source node performs teleportation only after an end-to-end entangled state has been established by entanglement swapping with partially entangled states.Thus,the security of quantum communication is guaranteed.The destination node recovers the transmitted quantum bit with the help of an auxiliary quantum bit and specially defined unitary matrices.Detailed calculations and simulation analyses show that the probability of successfully transferring a quantum bit in the presented scheme is high.In addition,the auxiliary quantum bit provides a heralded mechanism for successful communication.Based on the critical components that are presented in this article an efficient,secure,and practical wide-area quantum communication can be achieved. 展开更多
关键词 satellite-to-ground quantum communication network partially entangled states entanglementswapping quantum teleportation
下载PDF
Controlled quantum state sharing of arbitrary two-qubit states with five-qubit cluster states
9
作者 王东 查新未 +2 位作者 兰倩 李宁 卫静 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第9期54-58,共5页
In this paper, we propose a controlled quantum state sharing scheme to share an arbitrary two-qubit state using a five-qubit cluster state and the Bell state measurement. In this scheme, the five-qubit cluster state i... In this paper, we propose a controlled quantum state sharing scheme to share an arbitrary two-qubit state using a five-qubit cluster state and the Bell state measurement. In this scheme, the five-qubit cluster state is shared by a sender (Alice), a controller (Charlie), and a receiver (Bob), and the sender only needs to perform the Bell-state measurements on her particles during the quantum state sharing process, the controller performs a single-qubit projective measurement on his particles, then the receiver can reconstruct the arbitrary two-qubit state by performing some appropriate unitary transformations on his particles after he has known the measured results of the sender and the controller. 展开更多
关键词 controlled quantum state sharing five-qubit cluster state Bell-state measurements
下载PDF
Efficient quantum secret sharing scheme with two-particle entangled states
10
作者 朱珍超 张玉清 付安民 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期59-64,共6页
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ... This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. 展开更多
关键词 quantum secret sharing quantum entanglement Bell state nonorthogonal base
下载PDF
Protected simultaneous quantum remote state preparation scheme by weak and reversal measurements in noisy environments
11
作者 Mandal Manoj Kumar Choudhury Binayak S. Samanta Soumen 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期169-177,共9页
We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is know... We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform. 展开更多
关键词 multi-qubit entangled channel quantum remote state preparation noisy environments weak and reversal measurements
下载PDF
Novel traveling quantum anonymous voting scheme via GHZ states
12
作者 赵文浩 姜敏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期97-102,共6页
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle... Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security. 展开更多
关键词 quantum anonymous voting quantum secure communication GHZ states verifiability PRIVACY
下载PDF
Quantum Oblivious Transfer with Reusable Bell State
13
作者 Shu-Yu Kuo Kuo-Chun Tseng +1 位作者 Yao-Hsin Chou Fan-Hsun Tseng 《Computers, Materials & Continua》 SCIE EI 2023年第1期915-932,共18页
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra... In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time. 展开更多
关键词 quantum cryptography information security quantum oblivious transfer bell state
下载PDF
Comparison of differential evolution, particle swarm optimization,quantum-behaved particle swarm optimization, and quantum evolutionary algorithm for preparation of quantum states
14
作者 程鑫 鲁秀娟 +1 位作者 刘亚楠 匡森 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期53-59,共7页
Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), ... Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), particle swarm optimization(PSO), quantum-behaved particle swarm optimization(QPSO), and quantum evolutionary algorithm(QEA).We compare their control performance and point out their differences. By sampling and learning for uncertain quantum systems, the robustness of control pulses found by these four algorithms is also demonstrated and compared. The resulting research shows that the QPSO nearly outperforms the other three algorithms for all the performance criteria considered.This conclusion provides an important reference for solving complex quantum control problems by optimization algorithms and makes the QPSO be a powerful optimization tool. 展开更多
关键词 quantum control state preparation intelligent optimization algorithm
下载PDF
Degenerate States in Nonlinear Sigma Model with SU(2) Symmetry
15
作者 Tomo Munehisa 《World Journal of Condensed Matter Physics》 CAS 2023年第1期14-39,共26页
Entanglement in quantum theory is a peculiar concept to scientists. With this concept we are forced to re-consider the cluster property which means that one event is irrelevant to another event when they are fully far... Entanglement in quantum theory is a peculiar concept to scientists. With this concept we are forced to re-consider the cluster property which means that one event is irrelevant to another event when they are fully far away. In the recent works we showed that the quasi-degenerate states induce the violation of cluster property in antiferromagnets when the continuous symmetry breaks spontaneously. We expect that the violation of cluster property will be observed in other materials too, because the spontaneous symmetry breaking is found in many systems such as the high temperature superconductors and the superfluidity. In order to examine the cluster property for these materials, we studied a quantum nonlinear sigma model with U(1) symmetry in the previous work. There we showed that the model does have quasi-degenerate states. In this paper we study the quantum nonlinear sigma model with SU(2) symmetry. In our approach we first define the quantum system on the lattice and then adopt the representation where the kinetic term is diagonalized. Since we have no definition on the conjugate variable to the angle variable, we use the angular momentum operators instead for the kinetic term. In this representation we introduce the states with the fixed quantum numbers and carry out numerical calculations using quantum Monte Carlo methods and other methods. Through analytical and numerical studies, we conclude that the energy of the quasi-degenerate state is proportional to the squared total angular momentum as well as to the inverse of the lattice size. 展开更多
关键词 quantum Nonlinear Sigma Model SU(2): Special Unitary Group in two Dimensions Cluster Property Spontaneous Symmetry Breaking Degenerate states Spin-Weighted Harmonics
下载PDF
Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum 被引量:18
16
作者 王乐 赵生妹 +1 位作者 巩龙延 程维文 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第12期238-245,共8页
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc... In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. 展开更多
关键词 measurement-device-independent quantum key distribution orbital angular momentum atmospheric turbulence decoy states
下载PDF
The entropic squeezing of superposition of two arbitrary coherent states 被引量:7
17
作者 卢道明 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期618-623,共6页
In this paper the superpositions of two arbitrary coherent states |ψ〉 = α |β| + be^iψ |mβe^iδ〉 are constructed by using the superposition principle of quantum mechanics. The entropic squeezing effects of ... In this paper the superpositions of two arbitrary coherent states |ψ〉 = α |β| + be^iψ |mβe^iδ〉 are constructed by using the superposition principle of quantum mechanics. The entropic squeezing effects of the quantum states are studied. The numerical results indicate that the amplitudes, the ratio between the amplitudes of two coherent states, the phase difference between the two components and the relative phase of the two coefficients play important roles in the squeezing effects of the position entropy and momentum entropy. 展开更多
关键词 coherent state superposition state entropy squeezing
下载PDF
Stationary Measures of Three-State Quantum Walks with Defect on the One-Dimension Lattice
18
作者 Jinling Gao Mingjun Zhang 《Open Journal of Applied Sciences》 CAS 2023年第4期473-482,共10页
In this paper, we focus on the space-inhomogeneous three-state on the one-dimension lattice, a one-phase model and a two-phase model include. By using the transfer matrices method by Endo et al., we calculate the stat... In this paper, we focus on the space-inhomogeneous three-state on the one-dimension lattice, a one-phase model and a two-phase model include. By using the transfer matrices method by Endo et al., we calculate the stationary measure for initial state concrete eigenvalue. Finally we found the transfer matrices method is more effective for the three-state quantum walks than the method obtained by Kawai et al. 展开更多
关键词 Three-state quantum Walks Stationary Measure One-Phase two-PHASE Transfer Matrices
下载PDF
Probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel and its application in quantum state sharing 被引量:3
19
作者 周萍 李熙涵 +1 位作者 邓富国 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第10期2867-2874,共8页
This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state t... This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state to the receiver Bob, and then Bob reconstructs the state with an auxiliary particle and some unitary operations if the teleportation succeeds. This scheme has the advantage of transmitting much less particles for teleporting an arbitrary GHZ-class state than others. Moreover, it discusses the application of this scheme in quantum state sharing. 展开更多
关键词 quantum teleportation arbitrary GHZ-class state pure entanglement quantum state sharing
下载PDF
Quantum secure direct communication with quantum encryption based on pure entangled states 被引量:42
20
作者 李熙涵 李春燕 +3 位作者 邓富国 周萍 梁玉洁 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2149-2153,共5页
关键词 量子学 量子编码 量子键 通信安全 纠缠状态
下载PDF
上一页 1 2 191 下一页 到第
使用帮助 返回顶部